crwdns2933423:0crwdne2933423:0

crwdns2944351:0crwdnd2944351:0How to use John the Ripper in Kali Linuxcrwdnd2944351:0crwdne2944351:0

crwdns2933797:0Jacob Mehnertcrwdnd2933797:0crwdne2933797:0

crwdns2936043:0crwdne2936043:0 crwdns2933505:0crwdne2933505:0 Jacob Mehnert

crwdns2933769:0crwdne2933769:0
crwdns2933771:0crwdne2933771:0
crwdns2933801:0crwdne2933801:0
Introduction
***Warning:*** Obtaining unauthorized access to another's computer system or systems is illegal under the [link|https://www.nacdl.org/Landing/ComputerFraudandAbuseAct|Computer Fraud & Abuse Act|new_window=true].
The following guide was made with the purpose of educating others on cyber security tools, technologies, and techniques with the intention of educating others on better protecting their own technologies and data. ***Please use the knowledge gained from this guide responsibly.***
=== ***What is John the Ripper?*** ===
John the Ripper is a password cracking program that is used during pen testing, and can help IT staff to find weak passwords or identify poor password policies. John the Ripper uses several encryption technologies to autodetect the encryptions of hashed data and compares it against a list of plain-text file that contains common passwords.
=== What encryptions are supported? ===
John the Ripper supports the following encryptions...
* UNIX crypt(3)
* Traditional DES-based
* “bigcrypt”
* BSDI extended DES-based
* FreeBSD MD5-based (linux and Cisco IOS)
* OpenBSD Blowfish-based
* Kerberos/AFS
* Windows LM (DES-based)
* DES-based tripcodes
* SHA-crypt hashes (newer versions of Fedora and Ubuntu)
* SHA-crypt and SUNMD5 hashes (Solaris)
While these are the officially supported encryptions, additional encryptions can be added through extensions.